John Shaw, Wisconsin DOT, 2013 Federal Highway Administration, 2013.

Slides:



Advertisements
Similar presentations
Federal Highway Administration Size and Weight Technologies ITS America Conference - May 2006 Session #35 Office of Freight Management and Operations Mike.
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Presented by Serge Kpan LTEC Network Systems Administration 1.
John Shaw, Wisconsin DOT, 2013 Federal Highway Administration, 2013.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
1 Lecture 30 Introduction to Data Communications Overview  Lecture Objectives.  Data Communications: Basics.  Major Issues in Data Communications. 
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
MAC AddressesCS-502 (EMC) Fall Clarification — MAC Addresses and IP Networks CS-502, Operating Systems Fall 2009 (EMC) (Slides include materials.
Communication concepts (Continued) Week 2 Lecture 2.
Topologies – A topologies is an arrange of cables in a LAN. The most common topologies are,star, ring, bus and also a hybrid that got all of the mixtures.
ZigBee. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Topics.
For more notes and topics visit: eITnotes.com.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Networks CSCI-N 100 Dept. of Computer and Information Science.
1 © 2012 InfoComm International Essentials of AV Technology Networking for Data and AV.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Rhys McBreen (How the internet works) X. Contents The Layers and what they do IP Addressing X.
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Lab 4 ZigBee & with PICDEM Z Boards 55:088 Fall 2006.
Networking & the Internet. 2 What is a Network? □ A computer network allows computers to communicate with many other computers and to share resources.
Introduction to Networks Ruth Watson
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
Topologies The structure of the network –Physical topology Actual layout of the media –Logical topology How the hosts access the media.
MAC Address Sensing for Multi-modal Data Collection University of Washington STAR Lab July 17 th, 2015.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
1 IntelliDrive SM Research, Development and Emerging Technologies National ITS Perspective Panel Joseph I. Peters, Ph.D. Federal Highway Administration.
Chapter 6 – Connectivity Devices
SYSTEM ADMINISTRATION Chapter 8 Internet Protocol (IP) Addressing.
Networking & the Internet. 2 What is a Network? □ A computer network allows computers to communicate with many other computers and to share resources.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Traffic Safety and Operations Lab Dept. of Civil and Environmental Engineering University of Maryland, College Park Maryland State Highway Administration.
 The devices which each intercorrect several computer or different to each other, each nones network devices.  There are various types of Network devices.
Topology, refers to the physical and logical diagrams which summarize network connections and information flow.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Token Ring EthernetFDDIDevicesTesting
1 Hardware Addressing and Frame Type Identification.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
 Shut off unused lights  Shut off unused electronics  Turn on fans to lower A/C usage.
Networking Components Assignment 3 Corbin Watkins.
CSCI 530 Lab Packet Sniffing.
Networks DEVICES. Repeater device to amplify or regenerate digital signals received while setting them from one part of a network into another. Works.
Sniffer for Detecting Lost Mobiles
Mobile Packet Sniffer Ofer Borosh Vadim Lanzman Dr. Chen Avin
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 03 Standards and Technologies.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
Do Now Turn to your notes packet. Continue working on the page of questions we left off on (#14, 15, and 16). Go to next page and do #17.
Data Communications Chapter 1 – Data Communications, Data Networks, and the Internet.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Enhanced Interlock Technology Christopher Morris, Virginia Dawn Blake, Washington.
SIMS-201 Computer Networks.
LESSON 2.1_A Networking Fundamentals Understand Switches.
Part III. Data Link Layer
Bluetooth History and Uses.
Lab 2 – Hub/Switch Data Link Layer
How a Stateful Firewall Works
Lab 2 – Hub/Switch Data Link Layer
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
Routing and Switching Essentials v6.0
Setting Up Firewall using Netfilter and Iptables
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
SIMS-201 Computer Networks.
Layering and the TCP/IP protocol Suite
Presentation transcript:

John Shaw, Wisconsin DOT, 2013

Federal Highway Administration, 2013

Non-Significant Address Part (NAP)Upper Address Part (UAP)Lower Address Part (LAP) 00:00094E:22:19 Manufacturer-assigned, irrelevantCan be derived from trafficSent in every packet

University of Washington STAR Lab

Washington State Transportation Center, 2011

University of Washington STAR Lab

 Remember this slide? LAP does not permit manufacturer identification; UAP/NAP is captured  Not globally unique? 1 in 16,777,216 is pretty unique in most metro areas. Have two or more devices in your car?

Edward Snowden by way of the Washington Post

Areas on Seattle area highways showing recurrent inquiry activity Transmissions from 9E:8B:33:16 Locations match expected spots for route choice tracking, also DoT traffic cameras. Notably absent: SR520 bridge

Multiple areas where an address was found for <200M on each pass Approximates the area covered by a Class 1 Bluetooth transceiver Locations were a subset of inquiry scan locations! Notably absent: SR520 bridge, home of known Bluetooth speed sensors

Sent pages for the seven addresses detected in passive scan at their locations. No response. Standard Bluetooth devices usually don’t even have a way to turn off page scan – it’s not a standard mode. Trivial from a Linux PC, though. Unfortunately, this means we have no new data about the sniffers’ manufacturer, device capabilities, etc.